HumanCompatibleAI / tensor-trustLinks
A prompt injection game to collect data for robust ML research
☆68Updated last year
Alternatives and similar repositories for tensor-trust
Users that are interested in tensor-trust are comparing it to the libraries listed below
Sorting:
- ☆114Updated 2 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆91Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆57Updated last year
- Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks [ICLR 2025]☆377Updated last year
- Papers about red teaming LLMs and Multimodal models.☆159Updated 8 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆184Updated 10 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Updated last year
- ☆123Updated 6 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33Updated last year
- PromptInject is a framework that assembles prompts in a modular fashion to provide a quantitative analysis of the robustness of LLMs to a…☆452Updated last year
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆176Updated last year
- Whispers in the Machine: Confidentiality in Agentic Systems☆41Updated last month
- Persuasive Jailbreaker: we can persuade LLMs to jailbreak them!☆349Updated 3 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆384Updated 3 months ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆79Updated 5 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆68Updated last year
- General research for Dreadnode☆27Updated last year
- TAP: An automated jailbreaking method for black-box LLMs☆217Updated last year
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆157Updated 8 months ago
- Attack to induce LLMs within hallucinations☆164Updated last year
- Code to break Llama Guard☆32Updated 2 years ago
- Does Refusal Training in LLMs Generalize to the Past Tense? [ICLR 2025]☆77Updated last year
- Red-Teaming Language Models with DSPy☆250Updated 11 months ago
- Code to conduct an embedding attack on LLMs☆31Updated last year
- ☆98Updated 2 years ago
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆69Updated 2 years ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆425Updated this week
- Adversarial Attacks on GPT-4 via Simple Random Search [Dec 2023]☆43Updated last year
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆116Updated last year